4
4
"bytes"
5
5
"compress/gzip"
6
6
"context"
7
+ "encoding/hex"
7
8
"errors"
8
9
"fmt"
9
10
"io"
@@ -324,6 +325,51 @@ func (r *pyroscopeReceiver) Push(ctx context.Context, req *connect.Request[pushv
324
325
return connect .NewResponse (& pushv1.PushResponse {}), nil
325
326
}
326
327
328
+ func (r * pyroscopeReceiver ) getProfilesBuff (req * http.Request ) (* bytes.Buffer , error ) {
329
+ var err error
330
+ var buf * bytes.Buffer
331
+ defer func () {
332
+ if err != nil && buf != nil {
333
+ releaseBuf (r .uncompressedBufPool , buf )
334
+ }
335
+ }()
336
+ contentType := ""
337
+ if len (req .Header ["Content-Type" ]) > 0 {
338
+ contentType = req .Header ["Content-Type" ][0 ]
339
+ }
340
+ if strings .HasPrefix (contentType , "multipart/form-data" ) {
341
+ var f multipart.File
342
+ f , err = r .openMultipart (req )
343
+ if err != nil {
344
+ fmt .Println (req .URL .String ())
345
+ for k , v := range req .Header {
346
+ fmt .Printf ("Header: %s: %v" , k , v )
347
+ }
348
+ b , _ := io .ReadAll (req .Body )
349
+ //TODO: encode b to hex
350
+ fmt .Printf ("Body: %s\n " , hex .EncodeToString (b ))
351
+ return nil , err
352
+ }
353
+ defer f .Close ()
354
+
355
+ buf = acquireBuf (r .uncompressedBufPool )
356
+ err = r .decompressor .Decompress (f , compress .Gzip , buf )
357
+ if err != nil {
358
+ return nil , fmt .Errorf ("failed to decompress body: %w" , err )
359
+ }
360
+ return buf , nil
361
+ }
362
+ if strings .HasPrefix (contentType , "binary/octet-stream" ) {
363
+ buf = acquireBuf (r .uncompressedBufPool )
364
+ _ , err = io .Copy (buf , req .Body )
365
+ if err != nil {
366
+ return buf , fmt .Errorf ("failed to read body: %w" , err )
367
+ }
368
+ return buf , nil
369
+ }
370
+ return nil , fmt .Errorf ("unsupported content type: %s" , contentType )
371
+ }
372
+
327
373
func (r * pyroscopeReceiver ) readProfiles (ctx context.Context , req * http.Request , pm params ) (plog.Logs , error ) {
328
374
var (
329
375
tmp []string
@@ -342,21 +388,14 @@ func (r *pyroscopeReceiver) readProfiles(ctx context.Context, req *http.Request,
342
388
p = pprofparser .NewPprofParser ()
343
389
}
344
390
// support only multipart/form-data
345
- f , err := r .openMultipart (req )
391
+ buf , err := r .getProfilesBuff (req )
346
392
if err != nil {
347
393
return logs , err
348
394
}
349
- defer f .Close ()
350
-
351
- buf := acquireBuf (r .uncompressedBufPool )
352
395
defer func () {
353
396
releaseBuf (r .uncompressedBufPool , buf )
354
397
}()
355
398
356
- err = r .decompressor .Decompress (f , compress .Gzip , buf )
357
- if err != nil {
358
- return logs , fmt .Errorf ("failed to decompress body: %w" , err )
359
- }
360
399
// TODO: try measure compressed size
361
400
otelcolReceiverPyroscopeRequestBodyUncompressedSizeBytes .Record (ctx , int64 (buf .Len ()), metric .WithAttributeSet (* newOtelcolAttrSetPayloadSizeBytes (pm .name , formatJfr , "" )))
362
401
resetHeaders (req )
@@ -384,15 +423,13 @@ func (r *pyroscopeReceiver) readProfiles(ctx context.Context, req *http.Request,
384
423
record := rs .AppendEmpty ()
385
424
if tmp , ok = qs ["format" ]; ok && (tmp [0 ] == "jfr" ) {
386
425
timestampNs = ns (pm .start )
387
- durationNs = pm .end - pm .start
388
- durationNs = ns (durationNs )
426
+ durationNs = ns (pm .end ) - ns (pm .start )
389
427
} else if tmp , ok = qs ["spyName" ]; ok && (tmp [0 ] == "nodespy" ) {
390
428
timestampNs = uint64 (pr .TimeStampNao )
391
429
durationNs = uint64 (pr .DurationNano )
392
430
} else {
393
- timestampNs = pm .start
394
- durationNs = pm .end - pm .start
395
- durationNs = ns (durationNs )
431
+ timestampNs = ns (pm .start )
432
+ durationNs = ns (pm .end ) - ns (pm .start )
396
433
}
397
434
record .SetTimestamp (pcommon .Timestamp (timestampNs ))
398
435
m := record .Attributes ()
@@ -409,7 +446,7 @@ func (r *pyroscopeReceiver) readProfiles(ctx context.Context, req *http.Request,
409
446
postProcessProf (pr .Profile , & m )
410
447
record .Body ().SetEmptyBytes ().FromRaw (pr .Payload .Bytes ())
411
448
sz += pr .Payload .Len ()
412
- r .logger .Debug (
449
+ r .logger .Info (
413
450
fmt .Sprintf ("parsed profile %d" , i ),
414
451
zap .Uint64 ("timestamp_ns" , timestampNs ),
415
452
zap .String ("type" , pr .Type .Type ),
@@ -427,7 +464,16 @@ func (r *pyroscopeReceiver) readProfiles(ctx context.Context, req *http.Request,
427
464
}
428
465
429
466
func ns (sec uint64 ) uint64 {
430
- return sec * 1e9
467
+ if sec < 10000000000000 {
468
+ return sec * 1e9
469
+ }
470
+ if sec < 10000000000000000 {
471
+ return sec * 1e6
472
+ }
473
+ if sec < 10000000000000000000 {
474
+ return sec * 1e3
475
+ }
476
+ return sec
431
477
}
432
478
433
479
func newOtelcolAttrSetPayloadSizeBytes (service string , typ string , encoding string ) * attribute.Set {
0 commit comments